test_paramiko_vendor.py 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194
  1. # test_paramiko_vendor.py
  2. #
  3. # Dulwich is dual-licensed under the Apache License, Version 2.0 and the GNU
  4. # General Public License as public by the Free Software Foundation; version 2.0
  5. # or (at your option) any later version. You can redistribute it and/or
  6. # modify it under the terms of either of these two licenses.
  7. #
  8. # Unless required by applicable law or agreed to in writing, software
  9. # distributed under the License is distributed on an "AS IS" BASIS,
  10. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  11. # See the License for the specific language governing permissions and
  12. # limitations under the License.
  13. #
  14. # You should have received a copy of the licenses; if not, see
  15. # <http://www.gnu.org/licenses/> for a copy of the GNU General Public License
  16. # and <http://www.apache.org/licenses/LICENSE-2.0> for a copy of the Apache
  17. # License, Version 2.0.
  18. #
  19. """Tests for paramiko_vendor."""
  20. import socket
  21. import paramiko
  22. import threading
  23. from dulwich.tests import TestCase
  24. from dulwich.contrib.paramiko_vendor import ParamikoSSHVendor
  25. from io import StringIO
  26. USER = 'testuser'
  27. PASSWORD = 'test'
  28. SERVER_KEY = """\
  29. -----BEGIN RSA PRIVATE KEY-----
  30. MIIEpAIBAAKCAQEAy/L1sSYAzxsMprtNXW4u/1jGXXkQmQ2xtmKVlR+RlIL3a1BH
  31. bzTpPlZyjltAAwzIP8XRh0iJFKz5y3zSQChhX47ZGN0NvQsVct8R+YwsUonwfAJ+
  32. JN0KBKKvC8fPHlzqBr3gX+ZxqsFH934tQ6wdQPH5eQWtdM8L826lMsH1737uyTGk
  33. +mCSDjL3c6EzY83g7qhkJU2R4qbi6ne01FaWADzG8sOzXnHT+xpxtk8TTT8yCVUY
  34. MmBNsSoA/ka3iWz70ghB+6Xb0WpFJZXWq1oYovviPAfZGZSrxBZMxsWMye70SdLl
  35. TqsBEt0+miIcm9s0fvjWvQuhaHX6mZs5VO4r5QIDAQABAoIBAGYqeYWaYgFdrYLA
  36. hUrubUCg+g3NHdFuGL4iuIgRXl4lFUh+2KoOuWDu8Uf60iA1AQNhV0sLvQ/Mbv3O
  37. s4xMLisuZfaclctDiCUZNenqnDFkxEF7BjH1QJV94W5nU4wEQ3/JEmM4D2zYkfKb
  38. FJW33JeyH6TOgUvohDYYEU1R+J9V8qA243p+ui1uVtNI6Pb0TXJnG5y9Ny4vkSWH
  39. Fi0QoMPR1r9xJ4SEearGzA/crb4SmmDTKhGSoMsT3d5ATieLmwcS66xWz8w4oFGJ
  40. yzDq24s4Fp9ccNjMf/xR8XRiekJv835gjEqwF9IXyvgOaq6XJ1iCqGPFDKa25nui
  41. JnEstOkCgYEA/ZXk7aIanvdeJlTqpX578sJfCnrXLydzE8emk1b7+5mrzGxQ4/pM
  42. PBQs2f8glT3t0O0mRX9NoRqnwrid88/b+cY4NCOICFZeasX336/gYQxyVeRLJS6Z
  43. hnGEQqry8qS7PdKAyeHMNmZFrUh4EiHiObymEfQS+mkRUObn0cGBTw8CgYEAzeQU
  44. D2baec1DawjppKaRynAvWjp+9ry1lZx9unryKVRwjRjkEpw+b3/+hdaF1IvsVSce
  45. cNj+6W2guZ2tyHuPhZ64/4SJVyE2hKDSKD4xTb2nVjsMeN0bLD2UWXC9mwbx8nWa
  46. 2tmtUZ7a/okQb2cSdosJinRewLNqXIsBXamT1csCgYEA0cXb2RCOQQ6U3dTFPx4A
  47. 3vMXuA2iUKmrsqMoEx6T2LBow/Sefdkik1iFOdipVYwjXP+w9zC2QR1Rxez/DR/X
  48. 8ymceNUjxPHdrSoTQQG29dFcC92MpDeGXQcuyA+uZjcLhbrLOzYEvsOfxBb87NMG
  49. 14hNQPDNekTMREafYo9WrtUCgYAREK54+FVzcwf7fymedA/xb4r9N4v+d3W1iNsC
  50. 8d3Qfyc1CrMct8aVB07ZWQaOr2pPRIbJY7L9NhD0UZVt4I/sy1MaGqonhqE2LP4+
  51. R6legDG2e/50ph7yc8gwAaA1kUXMiuLi8Nfkw/3yyvmJwklNegi4aRzRbA2Mzhi2
  52. 4q9WMQKBgQCb0JNyxHG4pvLWCF/j0Sm1FfvrpnqSv5678n1j4GX7Ka/TubOK1Y4K
  53. U+Oib7dKa/zQMWehVFNTayrsq6bKVZ6q7zG+IHiRLw4wjeAxREFH6WUjDrn9vl2l
  54. D48DKbBuBwuVOJWyq3qbfgJXojscgNQklrsPdXVhDwOF0dYxP89HnA==
  55. -----END RSA PRIVATE KEY-----"""
  56. CLIENT_KEY = """\
  57. -----BEGIN RSA PRIVATE KEY-----
  58. MIIEpAIBAAKCAQEAxvREKSElPOm/0z/nPO+j5rk2tjdgGcGc7We1QZ6TRXYLu7nN
  59. GeEFIL4p8N1i6dmB+Eydt7xqCU79MWD6Yy4prFe1+/K1wCDUxIbFMxqQcX5zjJzd
  60. i8j8PbcaUlVhP/OkjtkSxrXaGDO1BzfdV4iEBtTV/2l3zmLKJlt3jnOHLczP24CB
  61. DTQKp3rKshbRefzot9Y+wnaK692RsYgsyo9YEP0GyWKG9topCHk13r46J6vGLeuj
  62. ryUKqmbLJkzbJbIcEqwTDo5iHaCVqaMr5Hrb8BdMucSseqZQJsXSd+9tdRcIblUQ
  63. 38kZjmFMm4SFbruJcpZCNM2wNSZPIRX+3eiwNwIDAQABAoIBAHSacOBSJsr+jIi5
  64. KUOTh9IPtzswVUiDKwARCjB9Sf8p4lKR4N1L/n9kNJyQhApeikgGT2GCMftmqgoo
  65. tlculQoHFgemBlOmak0MV8NNzF5YKEy/GzF0CDH7gJfEpoyetVFrdA+2QS5yD6U9
  66. XqKQxiBi2VEqdScmyyeT8AwzNYTnPeH/DOEcnbdRjqiy/CD79F49CQ1lX1Fuqm0K
  67. I7BivBH1xo/rVnUP4F+IzocDqoga+Pjdj0LTXIgJlHQDSbhsQqWujWQDDuKb+MAw
  68. sNK4Zf8ErV3j1PyA7f/M5LLq6zgstkW4qikDHo4SpZX8kFOO8tjqb7kujj7XqeaB
  69. CxqrOTECgYEA73uWkrohcmDJ4KqbuL3tbExSCOUiaIV+sT1eGPNi7GCmXD4eW5Z4
  70. 75v2IHymW83lORSu/DrQ6sKr1nkuRpqr2iBzRmQpl/H+wahIhBXlnJ25uUjDsuPO
  71. 1Pq2LcmyD+jTxVnmbSe/q7O09gZQw3I6H4+BMHmpbf8tC97lqimzpJ0CgYEA1K0W
  72. ZL70Xtn9quyHvbtae/BW07NZnxvUg4UaVIAL9Zu34JyplJzyzbIjrmlDbv6aRogH
  73. /KtuG9tfbf55K/jjqNORiuRtzt1hUN1ye4dyW7tHx2/7lXdlqtyK40rQl8P0kqf8
  74. zaS6BqjnobgSdSpg32rWoL/pcBHPdJCJEgQ8zeMCgYEA0/PK8TOhNIzrP1dgGSKn
  75. hkkJ9etuB5nW5mEM7gJDFDf6JPupfJ/xiwe6z0fjKK9S57EhqgUYMB55XYnE5iIw
  76. ZQ6BV9SAZ4V7VsRs4dJLdNC3tn/rDGHJBgCaym2PlbsX6rvFT+h1IC8dwv0V79Ui
  77. Ehq9WTzkMoE8yhvNokvkPZUCgYEAgBAFxv5xGdh79ftdtXLmhnDvZ6S8l6Fjcxqo
  78. Ay/jg66Tp43OU226iv/0mmZKM8Dd1xC8dnon4GBVc19jSYYiWBulrRPlx0Xo/o+K
  79. CzZBN1lrXH1i6dqufpc0jq8TMf/N+q1q/c1uMupsKCY1/xVYpc+ok71b7J7c49zQ
  80. nOeuUW8CgYA9Infooy65FTgbzca0c9kbCUBmcAPQ2ItH3JcPKWPQTDuV62HcT00o
  81. fZdIV47Nez1W5Clk191RMy8TXuqI54kocciUWpThc6j44hz49oUueb8U4bLcEHzA
  82. WxtWBWHwxfSmqgTXilEA3ALJp0kNolLnEttnhENwJpZHlqtes0ZA4w==
  83. -----END RSA PRIVATE KEY-----"""
  84. class Server(paramiko.ServerInterface):
  85. """http://docs.paramiko.org/en/2.4/api/server.html"""
  86. def __init__(self, commands, *args, **kwargs):
  87. super(Server, self).__init__(*args, **kwargs)
  88. self.commands = commands
  89. def check_channel_exec_request(self, channel, command):
  90. self.commands.append(command)
  91. return True
  92. def check_auth_password(self, username, password):
  93. if username == USER and password == PASSWORD:
  94. return paramiko.AUTH_SUCCESSFUL
  95. return paramiko.AUTH_FAILED
  96. def check_auth_publickey(self, username, key):
  97. pubkey = paramiko.RSAKey.from_private_key(StringIO(CLIENT_KEY))
  98. if username == USER and key == pubkey:
  99. return paramiko.AUTH_SUCCESSFUL
  100. return paramiko.AUTH_FAILED
  101. def check_channel_request(self, kind, chanid):
  102. if kind == "session":
  103. return paramiko.OPEN_SUCCEEDED
  104. return paramiko.OPEN_FAILED_ADMINISTRATIVELY_PROHIBITED
  105. def get_allowed_auths(self, username):
  106. return "password,publickey"
  107. class ParamikoSSHVendorTests(TestCase):
  108. def setUp(self):
  109. import paramiko.transport
  110. # reenable server functionality for tests
  111. if hasattr(paramiko.transport, "SERVER_DISABLED_BY_GENTOO"):
  112. paramiko.transport.SERVER_DISABLED_BY_GENTOO = False
  113. self.commands = []
  114. socket.setdefaulttimeout(10)
  115. self.addCleanup(socket.setdefaulttimeout, None)
  116. self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  117. self.socket.bind(('127.0.0.1', 0))
  118. self.socket.listen(5)
  119. self.addCleanup(self.socket.close)
  120. self.port = self.socket.getsockname()[1]
  121. self.thread = threading.Thread(target=self._run)
  122. self.thread.start()
  123. def tearDown(self):
  124. self.thread.join()
  125. def _run(self):
  126. try:
  127. conn, addr = self.socket.accept()
  128. except socket.error:
  129. return False
  130. self.transport = paramiko.Transport(conn)
  131. self.addCleanup(self.transport.close)
  132. host_key = paramiko.RSAKey.from_private_key(StringIO(SERVER_KEY))
  133. self.transport.add_server_key(host_key)
  134. server = Server(self.commands)
  135. self.transport.start_server(server=server)
  136. def test_run_command_password(self):
  137. vendor = ParamikoSSHVendor(allow_agent=False, look_for_keys=False,)
  138. vendor.run_command(
  139. '127.0.0.1', 'test_run_command_password',
  140. username=USER, port=self.port, password=PASSWORD)
  141. self.assertIn(b'test_run_command_password', self.commands)
  142. def test_run_command_with_privkey(self):
  143. key = paramiko.RSAKey.from_private_key(StringIO(CLIENT_KEY))
  144. vendor = ParamikoSSHVendor(allow_agent=False, look_for_keys=False,)
  145. vendor.run_command(
  146. '127.0.0.1', 'test_run_command_with_privkey',
  147. username=USER, port=self.port, pkey=key)
  148. self.assertIn(b'test_run_command_with_privkey', self.commands)
  149. def test_run_command_data_transfer(self):
  150. vendor = ParamikoSSHVendor(allow_agent=False, look_for_keys=False,)
  151. con = vendor.run_command(
  152. '127.0.0.1', 'test_run_command_data_transfer',
  153. username=USER, port=self.port, password=PASSWORD)
  154. self.assertIn(b'test_run_command_data_transfer', self.commands)
  155. channel = self.transport.accept(5)
  156. channel.send(b'stdout\n')
  157. channel.send_stderr(b'stderr\n')
  158. channel.close()
  159. # Fixme: it's return false
  160. # self.assertTrue(con.can_read())
  161. self.assertEqual(b'stdout\n', con.read(4096))
  162. # Fixme: it's return empty string
  163. # self.assertEqual(b'stderr\n', con.read_stderr(4096))